Skip to content

Commit 575e145

Browse files
committed
added collection details
1 parent 3d300fa commit 575e145

File tree

7 files changed

+54
-3
lines changed

7 files changed

+54
-3
lines changed

blog-service/2024-12-02-apps.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Microsoft Defender for Cloud (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- microsoft-defender-for-cloud
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Microsoft Defender for Cloud app for Sumo Logic. This app helps you to collect the alerts, security recommendation, and regulatory compliance logs using the Sumo Logic Cloud-to-Cloud Azure Event Hub Source and by configuring the continuos export using the Event Hub instance details in the Azure portal. Key features of the Microsoft Defender for Cloud app include:
15+
16+
- Gain real-time visibility into security alerts across your Azure environment, categorized by severity (High, Medium, Low, and Informational).
17+
- Monitor trends in alert activity over time to identify spikes and recurring threats.
18+
- Leverage detailed alert summaries and remediation steps for effective threat mitigation.
19+
- Track compliance performance across critical standards, including FedRAMP, PCI DSS 4, CIS Azure Foundations, and Microsoft Cloud Security Benchmark.
20+
- Analyze threats by categories like data exfiltration, unauthorized access, and account breaches.
21+
22+
Explore our technical documentation [here](/docs/integrations/microsoft-azure/microsoft-defender-for-cloud/) to learn how to set up and use the Microsoft Defender for Cloud app for Sumo Logic.

docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,13 @@ The Microsoft Defender for Cloud app uses the following logs:
3636
* [Security recommendations](https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations)
3737
* [Regulatory compliance](https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-regulatory-compliance-standards)
3838

39+
## Collection configuration
40+
41+
To forward Microsoft Defender events to Sumo Logic, you can set up an efficient pipeline: **Microsoft Defender****Event Hub** > **Sumo Logic (Hosted Collector)**. This setup ensures that security events from Microsoft Defender are seamlessly ingested into Sumo Logic for monitoring and analysis.
42+
43+
1. **[Create a Sumo Logic Azure Event Hub Source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/)**. Configure an Event Hub source to receive events from the Azure platform. This will act as the endpoint for the data pipeline.
44+
1. **[Set up continuous export in Azure](https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export)**. Within the Azure portal, configure the Microsoft Defender for Cloud to export its security events to the Event Hub instance created in the previous step. Continuous export ensures that the events such as alerts, recommendations, and regulatory compliance updates are forwarded in near real-time as shown below.
45+
3946
## Sample log messages
4047

4148
<details>
@@ -301,8 +308,6 @@ _sourceCategory=azure/defender "Microsoft.Security/regulatoryComplianceStandard
301308
| fields - _count
302309
```
303310

304-
## Collection configuration
305-
306311
## Installing the Microsoft Defender for Cloud app
307312

308313
import AppInstall from '../../reuse/apps/app-install.md';
@@ -357,6 +362,30 @@ import CreateMonitors from '../../reuse/apps/create-monitors.md';
357362
| `Critical Alert` | This is a high-priority alert that is triggered when a serious issue or threat is detected within your Azure environment. These alerts often correspond to malicious activities, severe configuration vulnerabilities, or critical system failures requiring immediate attention. | Critical | Count > 0|
358363
| `Critical Security Recommendation` | This alert is triggered when a high-risk vulnerability or misconfiguration is detected in your Azure resources. It provides actionable insights for strengthening your cloud security posture. | Critical | Count > 0 |
359364

365+
## Troubleshooting
366+
367+
### Verify Event Hub data flow
368+
369+
If your configured Event Hub instance is not successfully sending data to Sumo Logic. Follow the below steps to troubleshoot the issue:
370+
371+
1. Navigate to the **Event Hub Instance Blade** in the Azure portal and select the **Data Explorer(preview)** tab to send sample events..<br/> <img src={useBaseUrl('img/integrations/microsoft-azure/event-hub-instance-blade.png')} style={{border:'1px solid gray'}} alt="event-hub-instance-blade" width="800"/>
372+
1. In the **Data Explorer(preview)** page, click **Send event** and preview the sample events.<br/> <img src={useBaseUrl('img/integrations/microsoft-azure/data-explorer.png')} style={{border:'1px solid gray'}} alt="data-explorer" width="800"/>
373+
1. Verify if those events are being sent to the [Sumo Logic by Live Tailing](/docs/search/live-tail/about-live-tail/). If both the data matches, then event hub instance will be successfully sending data to Sumo Logic. <br/> <img src={useBaseUrl('img/integrations/microsoft-azure/live-tailing.png')} style={{border:'1px solid gray'}} alt="live-tailing" width="800"/>
374+
375+
### Validate alerts at Event Hub
376+
377+
If you are not recieving any alerts from the Microsoft Defender to the Event Hub instance. Firstly, make sure that the generated sample alerts are received in your configured Event Hub instance. This ensures the connection between Defender and Event Hub is functioning correctly. To test the pipeline by sending sample alerts from Microsoft Defender by following the below steps:
378+
379+
1. In the **Microsoft Defender** console, select **Security Alerts** under **General** section.
380+
1. In the **Security Alerts** page, select the **Sample Alerts** tab.
381+
1. Click on **Create sample alerts** to receieve the sample alerts. Thereby, to validate that the sample alerts are forwarded to the configured Event Hub instance.
382+
383+
<br/> <img src={useBaseUrl('img/integrations/microsoft-azure/validate-microsoft-defender-alerts.png')} style={{border:'1px solid gray'}} alt="validate-microsoft-defender-alerts" width="800"/>
384+
385+
:::info
386+
There may be a delay in forwarding alerts from Microsoft Defender to the Event Hub instance. If you experience significant delays, reach out to Azure Support for assistance.
387+
:::
388+
360389
## Upgrade/Downgrade the Microsoft Defender for Cloud app (Optional)
361390

362391
import AppUpdate from '../../reuse/apps/app-update.md';

docs/integrations/product-list/product-list-m-z.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
2525
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/maxmind-v2.png')} alt="Thumbnail icon" width="100"/> | [MaxMind](https://www.maxmind.com/en/home) | Automation integration: [MaxMind V2](/docs/platform-services/automation-service/app-central/integrations/maxmind-v2/) |
2626
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/mcafee-atd.png')} alt="Thumbnail icon" width="75"/> | [McAfee](https://www.mcafee.com/) | Automation integrations: <br/>- [McAfee ATD](/docs/platform-services/automation-service/app-central/integrations/mcafee-atd/) <br/>- [McAfee ESM](/docs/platform-services/automation-service/app-central/integrations/mcafee-esm/) <br/>- [McAfee MVISION](/docs/platform-services/automation-service/app-central/integrations/mcafee-mvision/) <br/>- [McAfee Network Security Platform Manager (NSM)](/docs/platform-services/automation-service/app-central/integrations/mcafee-network-security-platform-manager-nsm/) <br/>- [McAfee Web Gateway](/docs/platform-services/automation-service/app-central/integrations/mcafee-web-gateway/) <br/>Cloud SIEM integration: [McAfee](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/20dec895-f649-4959-9717-104fb68bb5b4.md) |
2727
| <img src={useBaseUrl('img/integrations/databases/memcached.png')} alt="Thumbnail icon" width="50"/> | [Memcached](https://memcached.org/) | Apps: <br/>- [Memcached](/docs/integrations/databases/memcached/) <br/>- [Memcached - OpenTelemetry](/docs/integrations/databases/opentelemetry/memcached-opentelemetry/) |
28-
| <img src={useBaseUrl('img/integrations/misc/microsoft-logo.png')} alt="Thumbnail icon" width="100"/> | [Microsoft](https://www.microsoft.com/) | Apps: <br/>- [Azure Active Directory](/docs/integrations/microsoft-azure/active-directory-azure/) <br/>- [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory)<br/>- [Microsoft Dynamics 365](/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights/) <br/>- [Microsoft Exchange Trace Logs](/docs/integrations/saas-cloud/microsoft-exchange-trace-logs/) <br/>- [Microsoft Graph Azure AD Reporting](/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting/) <br/>- [Microsoft Graph Identity Protection](/docs/integrations/microsoft-azure/microsoft-graph-identity-protection/) <br/>- [Microsoft Graph Security V1](/docs/integrations/saas-cloud/microsoft-graph-security-v1/) <br/>- [Microsoft Graph Security V2](/docs/integrations/saas-cloud/microsoft-graph-security-v2/) <br/>- [Microsoft Office 365](/docs/integrations/microsoft-azure/office-365/) <br/>- [Microsoft SQL Server](/docs/integrations/microsoft-azure/sql-server/) <br/>- [Microsoft SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry) <br/>- [Microsoft SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry) <br/>- [Microsoft Teams](/docs/integrations/microsoft-azure/teams/)<br/>Automation integrations: <br/>- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)<br/>- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/) <br/>- [Microsoft 365 Defender](/docs/platform-services/automation-service/app-central/integrations/microsoft-365-defender/) <br/>- [Microsoft Azure Log Analytics](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-log-analytics/) <br/>- [Microsoft Azure Security Center](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-security-center/) <br/>- [Microsoft Defender ATP](/docs/platform-services/automation-service/app-central/integrations/microsoft-defender-atp/) <br/>- [Microsoft EWS](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews/) <br/>- [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/) <br/>- [Microsoft EWS Extension](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-extension/) <br/>- [Microsoft Graph Security](/docs/platform-services/automation-service/app-central/integrations/microsoft-graph-security/)<br/>- [Microsoft OneDrive](/docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive/) <br/>- [Microsoft Sharepoint](/docs/platform-services/automation-service/app-central/integrations/microsoft-sharepoint/) <br/>- [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/) <br/>- [MSSQL](/docs/platform-services/automation-service/app-central/integrations/mssql/) <br/>- [Microsoft Teams](/docs/platform-services/automation-service/app-central/integrations/microsoft-teams/) <br/>Cloud SIEM integration: [Microsoft](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/2b002817-fd14-49b3-a3fe-c9761275b931.md) <br/>Collectors: <br/>- [Active Directory JSON - Classic Collector](/docs/integrations/microsoft-azure/active-directory-json/) <br/>- [Active Directory JSON - OpenTelemetry Collector](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/) <br/>- [Microsoft 365 Audit (Office 365 Audit) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office/) <br/>- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/) <br/>- [Microsoft Exchange Trace Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-exchange-trace-logs/) <br/>- [Microsoft Office 365 Audit Source](/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source/) <br/>- [Microsoft Graph Azure AD Reporting Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source/) <br/>- [Microsoft Graph Identity Protection Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source/) <br/>- [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) <br/>- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/) <br/>Community app: [Sumo Logic Microsoft Defender for EndPoint](https://github.com/SumoLogic/sumologic-content/tree/master/Microsoft/Defender_4_EndPoint) <br/>Webhook: [Webhook Connection for Microsoft Teams](/docs/alerts/webhook-connections/microsoft-teams/) |
28+
| <img src={useBaseUrl('img/integrations/misc/microsoft-logo.png')} alt="Thumbnail icon" width="100"/> | [Microsoft](https://www.microsoft.com/) | Apps: <br/>- [Azure Active Directory](/docs/integrations/microsoft-azure/active-directory-azure/) <br/>- [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory) <br/>- [Microsoft Defender for Cloud](/docs/integrations/microsoft-azure/microsoft-defender-for-cloud/) <br/>- [Microsoft Dynamics 365](/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights/) <br/>- [Microsoft Exchange Trace Logs](/docs/integrations/saas-cloud/microsoft-exchange-trace-logs/) <br/>- [Microsoft Graph Azure AD Reporting](/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting/) <br/>- [Microsoft Graph Identity Protection](/docs/integrations/microsoft-azure/microsoft-graph-identity-protection/) <br/>- [Microsoft Graph Security V1](/docs/integrations/saas-cloud/microsoft-graph-security-v1/) <br/>- [Microsoft Graph Security V2](/docs/integrations/saas-cloud/microsoft-graph-security-v2/) <br/>- [Microsoft Office 365](/docs/integrations/microsoft-azure/office-365/) <br/>- [Microsoft SQL Server](/docs/integrations/microsoft-azure/sql-server/) <br/>- [Microsoft SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry) <br/>- [Microsoft SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry) <br/>- [Microsoft Teams](/docs/integrations/microsoft-azure/teams/)<br/>Automation integrations: <br/>- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)<br/>- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/) <br/>- [Microsoft 365 Defender](/docs/platform-services/automation-service/app-central/integrations/microsoft-365-defender/) <br/>- [Microsoft Azure Log Analytics](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-log-analytics/) <br/>- [Microsoft Azure Security Center](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-security-center/) <br/>- [Microsoft Defender ATP](/docs/platform-services/automation-service/app-central/integrations/microsoft-defender-atp/) <br/>- [Microsoft EWS](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews/) <br/>- [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/) <br/>- [Microsoft EWS Extension](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-extension/) <br/>- [Microsoft Graph Security](/docs/platform-services/automation-service/app-central/integrations/microsoft-graph-security/)<br/>- [Microsoft OneDrive](/docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive/) <br/>- [Microsoft Sharepoint](/docs/platform-services/automation-service/app-central/integrations/microsoft-sharepoint/) <br/>- [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/) <br/>- [MSSQL](/docs/platform-services/automation-service/app-central/integrations/mssql/) <br/>- [Microsoft Teams](/docs/platform-services/automation-service/app-central/integrations/microsoft-teams/) <br/>Cloud SIEM integration: [Microsoft](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/2b002817-fd14-49b3-a3fe-c9761275b931.md) <br/>Collectors: <br/>- [Active Directory JSON - Classic Collector](/docs/integrations/microsoft-azure/active-directory-json/) <br/>- [Active Directory JSON - OpenTelemetry Collector](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/) <br/>- [Microsoft 365 Audit (Office 365 Audit) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office/) <br/>- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/) <br/>- [Microsoft Exchange Trace Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-exchange-trace-logs/) <br/>- [Microsoft Office 365 Audit Source](/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source/) <br/>- [Microsoft Graph Azure AD Reporting Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source/) <br/>- [Microsoft Graph Identity Protection Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source/) <br/>- [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) <br/>- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/) <br/>Community app: [Sumo Logic Microsoft Defender for EndPoint](https://github.com/SumoLogic/sumologic-content/tree/master/Microsoft/Defender_4_EndPoint) <br/>Webhook: [Webhook Connection for Microsoft Teams](/docs/alerts/webhook-connections/microsoft-teams/) |
2929
| <img src={useBaseUrl('img/integrations/saas-cloud/mimecast-logo.png')} alt="Thumbnail icon" width="50"/> | [Mimecast](https://www.mimecast.com/) | App: [Mimecast](/docs/integrations/saas-cloud/mimecast/) <br/>Automation integration: [Mimecast](/docs/platform-services/automation-service/app-central/integrations/mimecast/) <br/>Cloud SIEM integration: [Mimecast](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7BC43DFE-C5DD-4766-88E7-C163D82BBBF8.md) <br/>Collector: [Mimecast Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/mimecast-source/) <br/>Partner integration: [Mimecast app for Sumo Logic](https://github.com/SumoLogic/sumologic-public-partner-apps/tree/master/Mimecast) |
3030
| <img src={useBaseUrl('img/send-data/Miro-logo.png')} alt="Thumbnail icon" width="50"/> | [Miro](https://miro.com/) | App: [Miro](/docs/integrations/saas-cloud/miro/) <br/>Cloud SIEM integration: [Miro](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/9f149da1-2831-465f-8bb1-a5950ccaec0c.md) <br/>Collector: [Miro Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/miro-source/) |
3131
| <img src={useBaseUrl('img/integrations/misc/misp-logo.png')} alt="Thumbnail icon" width="100"/> | [MISP](https://www.misp-project.org/) | Automation integration: [MISP](/docs/platform-services/automation-service/app-central/integrations/misp/)<br/>Community app: [Sumo Logic for MISP](https://github.com/SumoLogic/sumologic-content/tree/master/MISP) |
176 KB
Loading
193 KB
Loading
134 KB
Loading
334 KB
Loading

0 commit comments

Comments
 (0)